CN108347469A - Item Information transmission method, device and system in a kind of Internet of Things - Google Patents

Item Information transmission method, device and system in a kind of Internet of Things Download PDF

Info

Publication number
CN108347469A
CN108347469A CN201710062986.9A CN201710062986A CN108347469A CN 108347469 A CN108347469 A CN 108347469A CN 201710062986 A CN201710062986 A CN 201710062986A CN 108347469 A CN108347469 A CN 108347469A
Authority
CN
China
Prior art keywords
equipment
information
item information
article
identification information
Prior art date
Application number
CN201710062986.9A
Other languages
Chinese (zh)
Inventor
闫韬
房婧婧
Original Assignee
西门子公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西门子公司 filed Critical 西门子公司
Priority to CN201710062986.9A priority Critical patent/CN108347469A/en
Publication of CN108347469A publication Critical patent/CN108347469A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3229Use of the SIM of a M-device as secure element
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0876Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/001Protecting confidentiality, e.g. by encryption or ciphering
    • H04W12/0013Protecting confidentiality, e.g. by encryption or ciphering of user plane, e.g. user traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Abstract

The present invention relates to the Item Information transmission method in Internet of Things technical field of information processing more particularly to a kind of Internet of Things, device and system, to reduce in current Internet of Things when obtaining Item Information, the risk of the sensitive informations such as device identification or account leakage.In a kind of Item Information transmission method, the second equipment sends article identification information to the first equipment, and the first equipment sends an Item Information request message to a third equipment, and Item Information request message includes verification information and article identification information.Wherein, verification information does not include that the equipment identification information of the second equipment does not also include the identification information of user.Third equipment sends Item Information when determining that Item Information request message has the permission of the Item Information obtained according to verification information, to the first equipment.It can effectively avoid the leakage of device identification and user's identity.

Description

Item Information transmission method, device and system in a kind of Internet of Things

Technical field

The present invention relates to the Item Information transmission sides in Internet of Things technical field of information processing more particularly to a kind of Internet of Things Method, device and system.

Background technology

Internet of Things (Internet of things, IoT) is a kind of object object connected network.In Internet of Things, between article It can be communicated, transmit information.

In general, article is labeled with label (tag) in Internet of Things, a label is used for one article of unique mark, alternatively, One label for one article of unique mark type (such as:Same brand, same category of mineral water in supermarket are posted Identical label, their price are identical).Common tag class includes but not limited to one-dimensional bar code, two-dimentional bar shaped Code, magnetic card, IC card, radio frequency identification (Radio Frequency Identification, RFID) label etc..Scanning can be passed through Label obtains the Item Information of the marked article of the label.

Fig. 1 shows the example that Item Information obtains.Customer is when supermarket check out counters are settled accounts, the article of customer's purchase On 101 label 102 (such as:One-dimensional bar code) by a scanning device 103 (such as:Bar code scanner) scanning, scanning Equipment 103 obtains the article identification information 106 of the article 101 described in label 102 by scanning.Scanning device 103 will scan 104 sending object information server (the Object Information of computer that obtained article identification information 106 passes through connection Server, OIS) 105, and the account name of the device identification of computer 104 or user is issued into OIS105.OIS105 is to calculating The account name of 104 user of device identification or computer of machine 104 is verified, if being verified, is returned to the computer 104 Return the Item Information 107 of article 101.

In example shown in FIG. 1, the account name of the device identification of itself or user is issued OIS105 by computer 104, When communicating dangerous between computer 104 and OIS105, such as there are listener-in, then the device identification of computer 104 or The account name of user may be ravesdropping, and when these sensitive informations are compromised, there are the tracked wind of computer or account Danger.

Invention content

In view of this, the embodiment of the present invention provides a kind of Item Information transmission method in Internet of Things, device and system, use To reduce in current Internet of Things when obtaining Item Information, the sensitive informations such as device identification or account leak, computer or account Tracked risk.

In a first aspect, the Item Information transmission method in providing a kind of Internet of Things, in this method, an object in Internet of Things Product have recorded the article identification information of the article by a tag identifier in the label.Second equipment obtains institute from the label It states article identification information and issues the first equipment.First equipment determines verification information, wherein the verification information describes The device attribute of second equipment, and do not include that the equipment identification information of second equipment and/or the verification information are retouched The attribute of the user of second equipment has been stated, and has not included the identification information of the user.First equipment An Item Information request message is sent to a third equipment, wherein the Item Information request message includes described tests Demonstrate,prove information and the article identification information.The third equipment is determining that the Item Information is asked according to the verification information When message has the permission of the Item Information obtained, the Item Information is sent to first equipment.Described first sets It is standby that the Item Information received is sent to second equipment.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

In one possible implementation, after first equipment receives the article identification information, described in determination Before verification information, judge whether the user of second equipment or second equipment is legal, if legal determining verification letter Breath.

Such as:After first equipment receives the article identification information, before determining the verification information, according to institute The equipment identification information for stating the second equipment judges the whether legal of second equipment, if legal, it is determined that the verification information.

Alternatively, such as:After first equipment receives the article identification information, before determining the verification information, Judge whether the user of second equipment is legal according to the identification information of the user of second equipment, if described The user of second equipment is legal, it is determined that the verification information.

Again alternatively, such as:After first equipment receives the article identification information, determine the verification information it Before, judge whether second equipment is legal according to the equipment identification information of second equipment, and according to second equipment The identification information of user judge whether the user of second equipment legal, if second equipment and described The user of two equipment is legal, it is determined that the verification information.

In the possible realization method, judge that the user of second equipment or second equipment is by the second equipment It is no legal, if legal determine verification information again, and then obtain Item Information.It both can be to avoid device identification and user's identity Leakage, and can prevent illegality equipment or user from obtaining Item Information.

In one possible implementation, second equipment obtains the Item Information with the article of merchandising, institute The first equipment is stated after the Item Information received is sent to second equipment, records the transaction letter of the article Breath, and send the Transaction Information to second equipment.

In the possible realization method, the second equipment can obtain the Transaction Information of article by the first equipment.

Further, optionally, the article identification information is for article described in unique mark, and first equipment is in determination After the article trading success, the third equipment is notified to delete the Item Information.The third equipment is receiving described After one equipment deletes the notice of the Item Information, the Item Information is deleted.

Wherein, after article trading success, Item Information is deleted from the server for providing Item Information, in this way After merchandising successfully, listener-in can not just obtain Item Information from server again, further ensure Item Information and be not stolen It takes.

Second aspect, provides the Item Information transmission method in another Internet of Things, and this method can be related to by first aspect First equipment execute, including:

First equipment from from second equipment receive Internet of Things in an article article identification information, In, the article identification information is documented in a label for identifying the article, and second equipment is used for from described Label obtains the article identification information;

First equipment determines verification information, wherein the verification information describes the equipment category of second equipment Property, and do not include that the equipment identification information of second equipment and/or the verification information describe making for second equipment The attribute of user, and do not include the identification information of the user;

First equipment sends an Item Information request message to a third equipment, wherein the Item Information Request message includes the verification information and the article identification information and the third equipment, for according to When verification information determines that the Item Information request message has the permission of the Item Information obtained, the article letter is provided Breath;

First equipment receives the Item Information from the third equipment;

The Item Information of reception is sent to second equipment by first equipment.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

In one possible implementation, after first equipment receives the article identification information, institute is determined Before stating verification information, the method further includes:First equipment judges according to the equipment identification information of second equipment Second equipment it is whether legal, first equipment determines the verification information, including:If first equipment determines institute It is legal to state the second equipment, it is determined that the verification information;And/or

After first equipment receives the article identification information, before determining the verification information, the method Further include:First equipment judges making for second equipment according to the identification information of the user of second equipment Whether user is legal, and first equipment determines the verification information, including:If first equipment determines second equipment User it is legal, it is determined that the verification information.

In the possible realization method, judge that the user of second equipment or second equipment is by the second equipment It is no legal, if legal determine verification information again, and then obtain Item Information.It both can be to avoid device identification and user's identity Leakage, and can prevent illegality equipment or user from obtaining Item Information.

In one possible implementation, second equipment obtains the Item Information with the article of merchandising, After the Item Information of reception is sent to second equipment by first equipment, the method further includes:Described One equipment records the Transaction Information of the article;First equipment sends the Transaction Information to second equipment.

In the possible realization method, the second equipment can obtain the Transaction Information of article by the first equipment.

Further, optionally, the article identification information further includes for article described in unique mark, the method:Institute The first equipment is stated after determining the article trading success, the third equipment is notified to delete the Item Information.

Wherein, after article trading success, Item Information is deleted from the server for providing Item Information, in this way After merchandising successfully, listener-in can not just obtain Item Information from server again, further ensure Item Information and be not stolen It takes.

The third aspect, provides the Item Information transmission method in another Internet of Things, and this method can be by the first aspect The third equipment being related to executes, including:

One third equipment receives an Item Information request message, the Item Information request from first equipment Message includes verification information and article identification information, wherein the article identification information is documented in for identifying in Internet of Things An article a label in;The verification information describes the device attribute of second equipment, and does not include described The equipment identification information of second equipment and/or the verification information describe the attribute of the user of second equipment, and not Include the identification information of the user;

The third equipment judges whether the Item Information request message has the institute obtained according to the verification information State the permission of Item Information;If the Item Information request message has the permission for obtaining the Item Information, to described the One equipment sends the Item Information.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

In one possible implementation, the article identification information is used for article described in unique mark, and the object Product information is acquired with the article of merchandising, and the method further includes:The third equipment is receiving the first equipment deletion After the notice of the Item Information, the Item Information is deleted.

Wherein, after article trading success, Item Information is deleted from the server for providing Item Information, in this way After merchandising successfully, listener-in can not just obtain Item Information from server again, further ensure Item Information and be not stolen It takes.

Fourth aspect provides the Item Information Transmission system in a kind of Internet of Things, which includes the first aspect institute First equipment, the second equipment and the third equipment being related to.

5th aspect provides a kind of first equipment, for realizing the function of the first equipment described in first aspect, including:

One the first transceiver module, for the article mark from the article received from second equipment in Internet of Things Information, wherein the article identification information is documented in a label for identifying the article, and second equipment is used for The article identification information is obtained from the label;

One processing module, for determining verification information, wherein the verification information describes setting for second equipment Standby attribute, and do not include that the equipment identification information of second equipment and/or the verification information describe second equipment User attribute, and do not include the identification information of the user;

One the second transceiver module, for sending an Item Information request message to a third equipment, wherein described Item Information request message includes the verification information and the article identification information and the third equipment, is used for When determining that the Item Information request message has the permission of the Item Information obtained according to the verification information, institute is provided State Item Information;

Second transceiver module is additionally operable to receive the Item Information from the third equipment;

First transceiver module is additionally operable to the Item Information that second transceiver module receives being sent to described Second equipment.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

In one possible implementation, the processing module, is additionally operable to:Described in being received in first transceiver module After article identification information, before the processing module determines the verification information, according to the device identification of second equipment Information judges the whether legal of second equipment;The processing module is specifically used for when determining the verification information:If institute It is legal to state the second equipment, it is determined that the verification information;And/or

The processing module, is additionally operable to:After first transceiver module receives the article identification information, the place Before reason module determines the verification information, described second is judged according to the identification information of the user of second equipment Whether the user of equipment is legal, and the processing module is specifically used for when determining the verification information:If second equipment User it is legal, it is determined that the verification information.

In the possible realization method, judge that the user of second equipment or second equipment is by the second equipment It is no legal, if legal determine verification information again, and then obtain Item Information.It both can be to avoid device identification and user's identity Leakage, and can prevent illegality equipment or user from obtaining Item Information.

In one possible implementation, second equipment obtains the Item Information with the article of merchandising, institute Processing module is stated to be additionally operable to:The Item Information that second transceiver module receives is sent in first transceiver module After second equipment, the Transaction Information of the article is recorded;First transceiver module, is additionally operable to:It is set to described second Preparation send the Transaction Information.

In the possible realization method, the second equipment can obtain the Transaction Information of article by the first equipment.

Further, optionally, the article identification information is also used for article described in unique mark, the processing module In:After determining the article trading success, the third equipment is notified to delete the article by second transceiver module Information.

Wherein, after article trading success, Item Information is deleted from the server for providing Item Information, in this way After merchandising successfully, listener-in can not just obtain Item Information from server again, further ensure Item Information and be not stolen It takes.

6th aspect, provides a kind of third equipment, for realizing the Item Information transmission in Internet of Things, including:

One transceiver module, for receiving an Item Information request message, the article letter from first equipment It includes verification information and article identification information to cease request message, wherein the article identification information is documented in for marker In one label of an article in networking;The verification information describes the device attribute of second equipment, and does not wrap Include second equipment equipment identification information and/or the verification information describe second equipment user category Property, and do not include the identification information of the user;

One processing module, for according to the verification information, judging whether the Item Information request message has and obtaining The permission of the Item Information taken;

The transceiver module, if being additionally operable to the Item Information request message has the permission for obtaining the Item Information, Then the Item Information is sent to first equipment.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

In one possible implementation, the article identification information is used for article described in unique mark, and the object Product information is acquired with the article of merchandising, and the processing module is additionally operable to:Described first is being received by the transceiver module After equipment deletes the notice of the Item Information, the Item Information is deleted.

Wherein, after article trading success, Item Information is deleted from the server for providing Item Information, in this way After merchandising successfully, listener-in can not just obtain Item Information from server again, further ensure Item Information and be not stolen It takes.

7th aspect provides a kind of first equipment, including:

One first transceiver, for the article mark letter from the article received from second equipment in Internet of Things Breath, wherein the article identification information is documented in a label for identifying the article, second equipment be used for from The label obtains the article identification information;

One processor, for determining verification information, wherein the equipment that the verification information describes second equipment Attribute, and do not include that the equipment identification information of second equipment and/or the verification information describe second equipment The attribute of user, and do not include the identification information of the user;

One second transceiver, for sending an Item Information request message to a third equipment, wherein the object Product information request message includes the verification information and the article identification information and the third equipment, in root When determining that the Item Information request message has the permission of the Item Information obtained according to the verification information, provide described Item Information;

The second transceiver is additionally operable to receive the Item Information from the third equipment;

The first transceiver is additionally operable to the Item Information that the second transceiver receives being sent to described second Equipment.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

Eighth aspect provides a kind of third equipment, for realizing the Item Information transmission in Internet of Things, including:

One transceiver, for receiving an Item Information request message, the Item Information from first equipment Request message includes verification information and article identification information, wherein the article identification information is documented in for identifying Internet of Things In one label of an article in net;The verification information describes the device attribute of second equipment, and does not include The equipment identification information of second equipment and/or the verification information describe the attribute of the user of second equipment, And do not include the identification information of the user;One processor, for according to the verification information, judging the article Whether information request message has the permission of the Item Information obtained;

The transceiver, if being additionally operable to the Item Information request message has the permission for obtaining the Item Information, The Item Information is sent to first equipment.

When Item Information transmits, to asking the second equipment of the Item Information or the user of the second equipment to access The verification of permission, the visitor for not had permission to avoid Item Information obtain.But in order to avoid device identification, use Person's identity is compromised, and when obtaining Item Information, provides the verification information for the equipment identification information for not including second equipment, Or the verification information for the identification information for not including the user is provided, it can effectively avoid device identification and user's identity Leakage.

9th aspect, provides a kind of machine readable media, machine instruction, the machine is stored on the machine readable media Device is instructed when being executed by processor, and the processor is made to execute any possible realization side of second aspect, second aspect The method that any possible realization method of formula, the third aspect or the third aspect provides.

In conjunction with any possible realization method of any of the above-described aspect or either side, in a kind of possible realization method In, first equipment is credible for second equipment and the third equipment.

Wherein, by one for the second equipment and the believable equipment of third equipment as an intermediate equipment, on the one hand Verification information above-mentioned is on the other hand issued into third equipment to obtain to receiving the article identification information from the first equipment Item Information.It can either ensure the safe transmission of Item Information, can also avoid device identification or the second equipment of the second equipment The identity of user be compromised.

Further, optionally, first equipment is the equipment that a mobile operator is provided, and second equipment is institute State the mobile terminal that mobile operator provides service.

Wherein, the equipment that mobile operator is provided is credible as the server for mobile terminal and offer Item Information Equipment, carry out the transmission of above-mentioned Item Information, have the advantages that convenient, safe.

Description of the drawings

Fig. 1 shows the example that Item Information obtains;

Fig. 2 is the structural schematic diagram of the Item Information Transmission system in a kind of Internet of Things provided in an embodiment of the present invention;

Fig. 3 is the flow chart of the Item Information transmission method in the first Internet of Things provided in an embodiment of the present invention;

Fig. 4 is the flow chart of the Item Information transmission method in second of Internet of Things provided in an embodiment of the present invention;

Fig. 5 is the flow chart of the Item Information transmission method in the third Internet of Things provided in an embodiment of the present invention;

Fig. 6 is the flow chart of the Item Information transmission method in the 4th kind of Internet of Things provided in an embodiment of the present invention;

Fig. 7 is the structural schematic diagram of the first the first equipment provided in an embodiment of the present invention;

Fig. 8 is the structural schematic diagram of second of first equipment provided in an embodiment of the present invention;

Fig. 9 is the structural schematic diagram of the first third equipment provided in an embodiment of the present invention;

Figure 10 is the structural schematic diagram of second of third equipment provided in an embodiment of the present invention.

Reference numerals list:

101:Article 102:Label 103:Scanning device

104:Computer 105:OIS 106:Article identification information

107:Item Information

201:First equipment 202:Second equipment 203:Third equipment

204:4th equipment 210:Article 220:Label

230:Article identification information 240:Verification information 250:Item Information

260:The location information 20 of 250 position of Item Information:System

S301:The article identification information 230 of article 210 is obtained from label 220

S302:Second equipment 202 sends article identification information 230 to the first equipment 201

S303:Location information 260 of first equipment 201 to 230 position of the 4th equipment 204 request article identification information

S304:4th equipment 204 is to 201 return position information 260 of the first equipment

S305:First equipment 201 determines verification information 240

S306:First equipment 201 sends Item Information request message to the third equipment 203 indicated by location information 260, Message includes verification information 240 and article identification information 230

S307:Third equipment 203 judges whether Item Information request message has according to verification information 240 and obtains article letter The permission of breath 250

S308:If Item Information request message has the permission for obtaining Item Information 250, returned to the first equipment 201 Item Information 250

S309:First equipment 201 is to 203 returned articles information 250 of third equipment

S310:Second equipment 202 sends the item purchase request message of purchase article 210 to the first equipment 201

S311:The expense of first equipment 201 payment purchase article 210

S312:First equipment 201 records the Transaction Information of article 210

S313:First equipment 201 notifies third equipment 203 to delete Item Information 250

S314:Third equipment 203 deletes Item Information 250

S315:Second equipment 202 asks the Transaction Information of article 210 to the first equipment 201

S316:Transaction Information of first equipment 201 to 202 returned articles 210 of the second equipment

S401:Receive article identification information 230

S402:To the location information 260 of 230 position of the 4th equipment 204 request article identification information

S403:Receive the location information 260 of the 4th equipment 204 return

S404;Determine verification information 240

S405:Item Information request message is sent to third equipment 203, message includes verification information 240 and article mark Know information 230

S406:Receive the Item Information 250 from third equipment 203

S407:To 202 returned articles information 250 of the second equipment

S408:Receive the item purchase request message of the purchase article 210 from the second equipment 202

S409:The expense of payment purchase article 210

S410:Record the Transaction Information of article 210

S411:Third equipment 203 is notified to delete Item Information 250

S412:Receive the request of the Transaction Information of the article 210 from the second equipment 202

S413:To the Transaction Information of 202 returned articles 210 of the second equipment

S501:Receive the Item Information request message from the first equipment 201

S502:Judge whether Item Information request message has according to the verification information 240 in Item Information request message Obtain the permission of Item Information 250

S503:Item Information 250 is sent to the first equipment 201

S504:Receive the notice of the deletion Item Information 250 from the first equipment 201

S505:Delete Item Information 250

601:Record the label 602 of RFID:Mobile phone 603:Mobile operator equipment

604:Object naming analysis service (Object Naming Service, ONS) server

605:OIS S610:Ask electric product coding (Electronic Product Code, EPC)

S620:Return to EPC S630:EPC

S640:Ask the uniform resource locator (uniform resource locator, URL) of Item Information position

S650:Return to URL S660:According to URL Item Information is asked to OIS605

S670:OIS605 sends Item Information S680:Item Information is sent to mobile phone 602

2011:First transceiver module 2012:Processing module 2013:Second transceiver module

2014:First transceiver 2015:Processor 2016:Second transceiver

2031:Transceiver module 2032:Processing module 2033:Transceiver

2034:Processor

Specific implementation mode

In example shown in FIG. 1, when obtaining Item Information, needs device identification to be sent or account name to OIS, exist The tracked risk of sensitive information agreement, computer or account.

In the embodiment of the present invention, when obtaining Item Information, transmission is the device attribute information for not including device identification Or not include user's identity user attribute information, effectively prevent letting out for device identification and user's identity Leakage.

Further, provide the verification information for Authority Verification by third party device, the third party device for The equipment for asking Item Information, and be all believable for the server for providing Item Information, further ensure information biography Defeated safety.

Further, if obtaining Item Information for carrying out article trading, after article trading success, by Item Information It is deleted from the server for providing Item Information, in this way after merchandising successfully, listener-in can not just obtain from server again Item Information is taken, Item Information is further ensured and is not stolen.

In the following, the embodiment of the present invention is described in detail in conjunction with attached drawing.

Fig. 2 is the structural schematic diagram of the Item Information Transmission system 20 in a kind of Internet of Things provided in an embodiment of the present invention. As shown in Fig. 2, the system 20 may include:

One article 210, the article 210 can be material object, can also be a kind of service.Certainly, which may include Not only one article 210.

One label 220 for being used for marking articles 210, which can be attached on article 210, can also be one Individual label, such as:One customer can scan two-dimensional bar and the service of businessman in postprandial checkout with mobile phone, this two It is a label to tie up bar code, for identifying the businessman.Label can be one-dimensional bar code above-mentioned, two-dimensional bar, magnetic Card, IC card or RFID tag etc..

One the second equipment 202, the article identification information 230 of the article 210 for obtaining the record of label 220.Such as:If Label 220 is one-dimensional bar code, then the second equipment 202 can scan label 220 by the scanner of connection, obtain on label 220 The article identification information 230 of the article 210 of record.For another example:If label 220 is RFID tag, the second equipment 202 can pass through Built-in or external RFID card reader reads the article identification information 230 for the article 210 that label 220 is recorded.For another example:If mark Label 220 are two-dimensional bar, then the second equipment 202 can scan the two-dimensional bar by built-in or external camera, obtain The article identification information 230 for the article 210 that label 220 is recorded.

One the first equipment 201 for the Item Information 250 from the acquisition article 210 of third equipment 203 and is sent to second Equipment 202.Optionally, the first equipment 201 is credible for the second equipment 202 and third equipment 203.Such as:First equipment 201 is The equipment that one mobile operator is provided, the second equipment 202 provide a mobile terminal of service, the shifting for the mobile operator Dynamic terminal built-in RFID card reader, can be used for scanning RFID tag, read the article identification information of label record.The movement is transported Battalion quotient provide equipment be for the mobile terminal it is believable, and mobile operator for third equipment 203 be also it is believable, i.e., Mobile operator will not maliciously steal Item Information, and when being communicated between the second equipment 202 and third equipment 203, meeting Using certain safety measure, the information of transmission is avoided to be stolen as possible.First equipment 201 as third-party credible equipment into Row information is transmitted, and can effectively ensure that information transmission security.

One the second equipment 202, for providing Item Information 250.

Optionally, which may also include the 4th equipment 204, for providing 250 position of Item Information Location information.Correspondingly, the first equipment 201 is additionally operable to obtain the location information from third equipment 203, and is sending article letter When ceasing request message, the Item Information request message is sent to the third equipment 203 where the location information.

Fig. 3 is the flow chart of the Item Information transmission method in the first Internet of Things provided in an embodiment of the present invention.Such as Fig. 3 Shown, this method may include following steps:

S301:Second equipment 202 obtains the article identification information 230 of article 210 from label 220, wherein the second equipment 202 can scan label 220 by built-in or external code reader or camera, obtain the article identification information that label 220 is recorded 230。

S302:Second equipment 202 sends article identification information 230 to the first equipment 201.

S303:First equipment 201 asks article identification information after receiving article identification information 230, to the 4th equipment 204 The location information 260 of 230 positions.First equipment 201 also can itself storage location information 260, such first equipment 201 is then Without to 204 request position information 260 of the 4th equipment.

S304:4th equipment 204 is to 201 return position information 260 of the first equipment.

S305:First equipment 201 determines verification information 240.

The optional realization method of verification information 240 includes but not limited to the following two kinds:

Mode one

Verification information 240 describes the device attribute of second equipment 202, and does not include second equipment 202 Equipment identification information.First equipment 201 can prestore equipment identification information and the correspondence of device attribute, be come from when receiving After the article identification information 230 of second equipment 202, the equipment identification information of the second equipment 202 is determined, and according to pre-stored The correspondence of equipment identification information and device attribute determines the equipment category corresponding to the equipment identification information of the second equipment 202 Property.Such as:Equipment brand message, equipment purchase date information etc..

Mode two

Verification information 240 describes the attribute of the user of second equipment 202, and does not include the body of the user Part identification information.First equipment 201 can prestore the correspondence of the identification information of user and the attribute of user. Second equipment 202 can send the identification information of user to the first equipment 201, and the first equipment 201 is according to pre-stored The correspondence of the identification information of user and the attribute of user, determining makes corresponding to the identification information received The attribute of user.Such as:The age of user, franchise member prove information etc..

Certainly, also in combination with mode one and mode two, i.e. verification information 240 had both included the device attribute of the second equipment 202 Information also includes the attribute information of the user of the second equipment 202.

Optionally, step S305 can be after the first equipment of step S302 201 receives article identification information 230, step It executes before S303 request position informations 260, or executes while request position information 260 or later.

Optionally, the first equipment 201, also can be to the second equipment 202 or the second equipment during executing step S305 202 user carries out legitimate verification.If it is determined that the second equipment 202 is illegality equipment, or determine the use of the second equipment 202 Person is disabled user, then subsequent step is not carried out, optionally, can also to 202 returned articles information refuse information of the second equipment, Indicate that Reason For Denial is illegal obtains in message.

Such as:Can be by the way that equipment blacklist be arranged, being recorded in the equipment blacklist has equipment identification information, if the second equipment 202 equipment identification information is recorded in the equipment blacklist, it is determined that the second equipment 202 is illegality equipment.

For another example:Can be by the way that subscriber blacklist be arranged, record has the identification information of user in the subscriber blacklist, If the identification information of the user of the second equipment 202 is recorded in the subscriber blacklist, it is determined that the second equipment 202 makes User is disabled user.

For another example:If the first equipment 201 is in the identification information of pre-stored user and the attribute of user In correspondence, the identification information of the user of the second equipment 202 is not found, it is determined that the use of the second equipment 202 Person is disabled user.

For another example:If the first equipment 201 does not have in pre-stored equipment identification information and the correspondence of device attribute There is the equipment identification information for finding the second equipment 202, it is determined that the second equipment 202 is illegality equipment.

In this way, the legitimacy of the user of second equipment 202 or the second equipment 202 is verified by the first equipment 201, Also it can effectively avoid disabled user and obtain article identification information 230.

S306:First equipment 201 sends Item Information request message to the third equipment 203 indicated by location information 260, Message includes verification information 240 and article identification information 230.It is thus not necessarily to send the second equipment 202 to third equipment 203 Equipment identification information or the second equipment 202 user identification information, so as to avoid obtain Item Information 250 When equipment identification information or the identity information of user be compromised.

S307:Third equipment 203 judges whether Item Information request message has according to verification information 240 and obtains article letter The permission of breath 250.

Third equipment 203 can prestore the correspondence and article mark of verification information and Item Information access rights Know the correspondence of information and Item Information.Such as:Third equipment 203 prestores verification information and addressable Item Information The correspondence of met condition.Third equipment 203 searches corresponding addressable Item Information according to verification information 240 to expire The condition of foot, judges whether the Item Information 250 for the article 210 that article identification information 230 is identified meets the condition, if symbol It closes, it is determined that Item Information request message has the permission for obtaining Item Information 250, if not meeting, it is determined that Item Information is asked Message is asked not have the permission for obtaining Item Information 250.

S308:If Item Information request message has the permission for obtaining Item Information 250, can be according to pre-stored object Correspondence between product identification information and Item Information determines the Item Information 250 corresponding to article identification information 230, and To 201 returned articles information 250 of the first equipment.

S309:First equipment 201 is to 203 returned articles information 250 of third equipment.

Optionally, the expense of the also payable purchase article 210 of the first equipment 201, is as follows:

S310:Second equipment 202 sends the item purchase request message of purchase article 210 to the first equipment 201.Second sets Standby 202 can include article identification information 230 in the item purchase request message.

S311:First equipment 201 determines article 210 according to article identification information 230, and pays the expense of purchase article 210 With.

S312:First equipment 201 records the Transaction Information of article 210, such as:Transaction value, trade date, exchange hour Deng.

S313:First equipment 201 notifies third equipment 203 to delete Item Information 250.First equipment 201 can be in article 210 After merchandising successfully, notice third equipment 203 deletes Item Information 250.In this way after merchandising successfully, listener-in just can not be again from clothes Item Information is obtained on business device, Item Information is further ensured and is not stolen.

S314:Third equipment 203 deletes Item Information 250.Third equipment 203 upon receipt of a notification, deletes Item Information 250, it can also delete the correspondence of Item Information 250 and article identification information 230.

Optionally, since in step S312, the first equipment 201 has recorded the Transaction Information of article 210, therefore, first sets Standby 201 can provide the Transaction Information to the second equipment 202.

S315:Optionally, the second equipment 202 asks the transaction of article 210 to be believed by step S315 to the first equipment 201 Breath.

S316:Transaction Information of first equipment 201 to 202 returned articles 210 of the second equipment.

Fig. 4 is the flow chart of the Item Information transmission method in second of Internet of Things provided in an embodiment of the present invention.This Two kinds of Item Information transmission methods are executed by the first equipment 201 above-mentioned, specifically may include following steps:

S401:Receive article identification information 230.

S402:To the location information 260 of 230 position of the 4th equipment 204 request article identification information.

S403:Receive the location information 260 of the 4th equipment 204 return.

S404;Determine verification information 240.

S405:Item Information request message is sent to third equipment 203, message includes verification information 240 and article mark Know information 230.

S406:Receive the Item Information 250 from third equipment 203.

S407:To 202 returned articles information 250 of the second equipment.

S408:Receive the item purchase request message of the purchase article 210 from the second equipment 202.

S409:The expense of payment purchase article 210.

S410:Record the Transaction Information of article 210.

S411:Third equipment 203 is notified to delete Item Information 250.

S412:Receive the request of the Transaction Information of the article 210 from the second equipment 202.

S413:To the Transaction Information of 202 returned articles 210 of the second equipment.

Other optional realization methods of this method can refer to the processing of the first equipment 201 in flow shown in Fig. 3, repeatedly refer to Go out to repeat no more.

Fig. 5 is the flow chart of the Item Information transmission method in the third Internet of Things provided in an embodiment of the present invention.This Three kinds of Item Information transmission methods can be executed by third equipment 203 above-mentioned, specifically may include following steps:

S501:Receive the Item Information request message from the first equipment 201.

S502:Judge whether Item Information request message has according to the verification information 240 in Item Information request message Obtain the permission of Item Information 250.

S503:If it is determined that the Item Information request message has the permission for obtaining Item Information 250, then to the first equipment 201 send Item Information 250.

S504:Receive the notice of the deletion Item Information 250 from the first equipment 201.

S505:Delete Item Information 250.

The optional realization method of this method can refer to the realization of third equipment 203 in flow shown in Fig. 3, repeat place no longer It repeats.

Fig. 6 is the flow chart of the Item Information transmission method in the 4th kind of Internet of Things provided in an embodiment of the present invention.This Four kinds of Item Information transmission methods can be considered an example of method shown in Fig. 3.

Wherein, the label 601 for recording RFID is an example of label 220 above-mentioned, and mobile phone 602 is above-mentioned second One example of equipment 202, mobile operator equipment 603 are an example of the first equipment 201 above-mentioned, object naming parsing Service the example that (Object Naming Service, ONS) server 604 is the 4th equipment 204 above-mentioned, OIS605 For an example of third equipment 203 above-mentioned.EPC is an example of article identification information 230 above-mentioned.

As shown in fig. 6, this method may include following steps:

S610:Mobile phone 602 asks EPC to label 601.Such as:The user of mobile phone 602 close to label 601, beats mobile phone The application APP on mobile phone 602 is opened, starts the RFID scanning means built in mobile phone 602, as mobile RFID (Mobile RFID, MRFID) scanning label 601.

S620:Label 601 returns to EPC to mobile phone 602.

S630:The EPC received is sent to mobile operator equipment 603 by mobile phone 602.Also, mobile phone 602 is by user's Identification information (such as:Log in user name, the password of mobile operator equipment 603) it is sent to mobile operator equipment 603, user is authenticated by mobile operator equipment 603, due to mobile operator equipment 603 be for mobile phone 602 can Letter, so this step mobile phone 602 can be only performed once Hash operation.

S640:Mobile operator equipment 603 asks the unified resource of Item Information position fixed to ONS servers 604 Position symbol (uniform resource locator, URL).

S650:ONS604 returns to the URL of OIS605.

S660:Mobile operator equipment 603 sends Item Information request message according to URL to OIS605, to ask article Information, message include the verification informations 240 above-mentioned such as the age of the user of OPC and mobile phone 602, franchise member's proof, It does not include the identification information of the user of mobile phone 602.Wherein, mobile operator equipment 603 can be from the database of itself Obtain the above-mentioned verification information 240 of non-real name.

S670:OIS605 sends Item Information to mobile operator equipment 603.

Wherein, OIS605 verifies above-mentioned verification information 240, such as:Inquire the access control in own database List stores the correspondence of verification information and corresponding Item Information access rights, OIS605 in the Interface Controller list By 240 corresponding Item Information access rights of determining verification information of tabling look-up, whether the Item Information request message received is judged Have permission acquisition Item Information.If having permission, Item Information is sent to mobile operator equipment 603.

S680:Mobile operator equipment 603 sends Item Information to mobile phone 602.Mobile operator equipment 603 and mobile phone An established session secret key can be used to be encrypted for communication between 602.

Further, after step S680, which may also include:

User can also buy the article that label 601 is marked by mobile phone 602.Mobile operator equipment 602 can represent Mobile phone 602 carries out the payment of article buying expenses, collects the expense from cell phone bill monthly later.If the one of EPC identification A article trading is successful, then mobile operator equipment 602 notifies OIS605 to delete the Item Information for the article that the EPC is identified. This can effectively prevent the details of the article of user's purchase of listener-in's acquisition mobile phone 602.

The Transaction Information of the memory mobile phone 602 in the database of itself of mobile operator equipment 603.Mobile phone 602 not only may be used The Item Information recorded on label 601 to inquire its access, can also inquire the Transaction Information described in the database.

In the following, flow shown in fig. 6 and flow shown in FIG. 1 are compared.

First, in flow shown in FIG. 1, computer 104 is needed as an agency to control scanning device 103 and label Communication between 102.And in flow shown in fig. 6, the MRFID devices built in mobile phone 602 complete scanning label and logical jointly The operation of letter control simplifies flow complexity compared with flow shown in FIG. 1.

Secondly, in flow shown in FIG. 1, computer 104 usually requires to execute 2~3 Hash operations to be handed in article It is authenticated during easily.And in flow shown in fig. 6, due to mobile operator equipment 603 be for mobile phone 602 it is believable, The payment that article expense is carried out by mobile operator equipment 603, can simplify verification process, usual mobile phone 602 only needs to hold 1 Hash operation of row.

Again, in flow shown in Fig. 1, computer 104 issues the account name of the device identification of itself or user OIS105, when communicating dangerous between computer 104 and OIS105, for example there are listener-ins, then the equipment of computer 104 Mark or the account name of user may be ravesdropping, when these sensitive informations are compromised, there are computer or account by with The risk of track.And in flow shown in fig. 6, mobile operator equipment 603 be for mobile phone 602 and label 601 it is believable, they Between communication be regarded as safe.Mobile operator equipment 603 only sends mobile phone when sending verification information to OIS605 The information such as the age of 602 user, franchise member's proof, the identification information without sending user.Using such The mode of non-real-name authentication, even if there are just can not if can not obtaining the identification information of user if listener-in listener-in Track the position of user.

Fig. 7 is the structural schematic diagram of the first the first equipment 201 provided in an embodiment of the present invention.As shown in fig. 7, the equipment It may include:

One the first transceiver module 2011 is used for from the article 210 received from second equipment 202 in Internet of Things Article identification information 230, wherein article identification information 230 is documented in a label 220 for marking articles 210, Two equipment 202 are used to obtain article identification information 230 from label 220;

One processing module 2012, for determining verification information 240, wherein verification information 240 describes the second equipment 202 device attribute, and do not include that the equipment identification information of the second equipment 202 and/or verification information 240 describe second and set The attribute of standby 202 user, and do not include the identification information of user;

One the second transceiver module 2013, for sending an Item Information request message to a third equipment 203, In, Item Information request message includes verification information 240 and article identification information 230 and third equipment 203, is used for When determining that Item Information request message has the permission of the Item Information 250 obtained according to verification information 240, Item Information is provided 250;

Second transceiver module 2013 is additionally operable to receive the Item Information 250 from third equipment 203;

First transceiver module 2011 is additionally operable to the Item Information 250 that the second transceiver module 2013 receives being sent to second Equipment 202.

Optionally, processing module 2012 are additionally operable to:After the first transceiver module 2011 receives article identification information 230, Before processing module 2012 determines verification information 240, the second equipment 202 is judged according to the equipment identification information of the second equipment 202 It is whether legal;Processing module 2012 is specifically used for when determining verification information 240:If the second equipment 202 is legal, it is determined that test Demonstrate,prove information 240;And/or processing module 2012, it is additionally operable to:After the first transceiver module 2011 receives article identification information 230, Before processing module 2012 determines verification information 240, second is judged according to the identification information of the user of the second equipment 202 Whether the user of equipment 202 is legal, and processing module 2012 is specifically used for when determining verification information 240:If the second equipment 202 User it is legal, it is determined that verification information 240.

Optionally, the second equipment 202 obtains Item Information 250 with transaction item 210, and processing module 2012 is additionally operable to: After the Item Information 250 that second transceiver module 2013 receives is sent to the second equipment 202 by the first transceiver module 2011, record The Transaction Information of article 210;First transceiver module 2011, is additionally operable to:Transaction Information is sent to the second equipment 202.

Optionally, article identification information 230 is used for unique mark article 210, and processing module 2012 is additionally operable to:Determining object After product 210 are merchandised successfully, third equipment 203 is notified to delete Item Information 250 by the second transceiver module 2013.

Optionally, the first equipment 201 is credible for the second equipment 202 and third equipment 203.

Optionally, the first equipment 201 is the equipment that a mobile operator is provided, and the second equipment 202 is mobile operator One mobile terminal of service is provided.

First that other optional realization methods of the first first equipment 201 can refer in method and system above-mentioned sets Standby 201 realization, wherein the first transceiver module 2011 can be used for being communicated with the second equipment 202, interactive information;Handle mould Block 2012 can be used for the operation of execution information processing, verification, control;Second transceiver module 2013 can be used for and third equipment 203 It is communicated with the 4th equipment 204, interactive information.

Fig. 8 is the structural schematic diagram of second of first equipment 201 provided in an embodiment of the present invention.As shown in figure 8, the equipment It may include:

One first transceiver 2014 is used for from the article 210 received from second equipment 202 in Internet of Things Article identification information 230, wherein article identification information 230 is documented in a label 220 for marking articles 210, and second Equipment 202 is used to obtain article identification information 230 from label 220;

One processor 2015, for determining verification information 240, wherein verification information 240 describes the second equipment 202 Device attribute, and include the second equipment 202 equipment identification information and/or verification information 240 describe the second equipment The attribute of 202 user, and do not include the identification information of user;

One second transceiver 2016, for sending an Item Information request message to a third equipment 203, In, Item Information request message includes verification information 240 and article identification information 230 and third equipment 203, is used for When determining that Item Information request message has the permission of the Item Information 250 obtained according to verification information 240, Item Information is provided 250;

Second transceiver 2016 is additionally operable to receive the Item Information 250 from third equipment 203;

First transceiver 2014 is additionally operable to the Item Information 250 that second transceiver 2016 receives being sent to the second equipment 202。

First that other optional realization methods of second of first equipment 201 can refer in method and system above-mentioned sets Standby 201 realization, wherein first transceiver 2014 can be used for being communicated with the second equipment 202, interactive information;Processor 2015 can be used for the operation of execution information processing, verification, control;Second transceiver 2016 can be used for and third equipment 203 and Four equipment 204 are communicated, interactive information.

Second of first equipment 201 also can be considered one of the first first equipment 201 shown in Fig. 7 in specific implementation The optional realization method of kind.Wherein, first transceiver 2014 is for realizing the operation of the first transceiver module 2011, foundation and second The difference of the communication mode of equipment 202 can be wireless transceiver, such as:Wireless Fidelity (Wireless Fidelity, WIFI) Module, long term evolution (Long Term Evolution, LTE) communication module or other wireless communication modules.Certainly, it first sets The standby mode that wire communication can also be used between 201 and the second equipment 202 is communicated.Processor 2015 is for realizing processing mould The operation of block 2012, it may include at least one central processing unit (Central Processing Unit, CPU) and/or at least one A digital signal processor (Digital Signal Processor, DSP) etc..Second transceiver 2016 is received for realizing second The operation for sending out module 2013 can be nothing above-mentioned according to the difference with the communication mode of third equipment 203 and the 4th equipment 204 Line transceiver.Certainly, the mode of wire communication can also be used in the first equipment 201 and third equipment 203 and the 4th equipment 204 are led to Letter, such as:Using fiber optic communication mode, second transceiver 2016 can be optical module at this time.

Fig. 9 is the structural schematic diagram of the first third equipment 203 provided in an embodiment of the present invention.As shown in figure 9, the third Equipment 203 may include:

One transceiver module 2031, for receiving an Item Information request message, article from first equipment 201 Information request message includes verification information 240 and article identification information 230, wherein article identification information 230, which is documented in, to be used for In a label 220 for identifying an article 210 in Internet of Things;Verification information 240 describes the equipment category of the second equipment 202 Property, and the equipment identification information including the second equipment 202 and/or verification information 240 describe the use of the second equipment 202 The attribute of person, and do not include the identification information of user;

One processing module 2032, for according to verification information 240, judging whether Item Information request message has and obtaining Item Information 250 permission;

Transceiver module 2031, if being additionally operable to Item Information request message has the permission for obtaining Item Information 250, to the One equipment 201 sends Item Information 250.

Optionally, article identification information 230 is used for unique mark article 210, and Item Information 250 is acquired with product Product 210, processing module 2032 are additionally operable to:The logical of Item Information 250 is deleted receiving the first equipment 201 by transceiver module 2031 After knowing, Item Information 250 is deleted.

The third that other optional realization methods of the first the third equipment 203 can refer in method and system above-mentioned is set Standby 203 realization, wherein transceiver module 2031 can be used for being communicated with the first equipment 201, interactive information;Processing module 2032 can be used for the operation of execution information processing, verification, control.

Figure 10 is the structural schematic diagram of second of third equipment 203 provided in an embodiment of the present invention.As shown in Figure 10, this Three equipment 203 may include:

One transceiver 2033, for receiving an Item Information request message, article letter from first equipment 201 It includes verification information 240 and article identification information 230 to cease request message, wherein article identification information 230 is documented in for marking In a label 220 for knowing an article 210 in Internet of Things;Verification information 240 describes the equipment category of the second equipment 202 Property, and the equipment identification information including the second equipment 202 and/or verification information 240 describe the use of the second equipment 202 The attribute of person, and do not include the identification information of user;

One processor 2034, for according to verification information 240, judging whether Item Information request message has acquisition The permission of Item Information 250;

Transceiver 2033, if being additionally operable to Item Information request message has the permission for obtaining Item Information 250, to first Equipment 201 sends Item Information 250.

The third that other optional realization methods of second of the third equipment 203 can refer in method and system above-mentioned is set Standby 203 realization, wherein transceiver 2033 can be used for being communicated with the first equipment 201, interactive information;Processor 2034 can For execution information processing, verification, the operation controlled.

Second of the third equipment 203 also can be considered one of the first third equipment 203 shown in Fig. 9 in specific implementation The optional realization method of kind.Wherein, for realizing the operation of transceiver module 2031, third equipment 203 first sets transceiver 2033 The mode that wire communication can be used between standby 201 is communicated.Such as:Using fiber optic communication mode, transceiver 2033 can at this time For optical module.Processor 2034 for realizing processing module 2032 operation, it may include at least one CPU and/or at least one DSP etc..

The embodiment of the present invention also provides a kind of machine readable media, and machine instruction is stored on the machine readable media, should Machine instruction makes processor execute the Item Information transmission method in any Internet of Things above-mentioned when being executed by processor. Specifically, system or device equipped with machine readable media can be provided, store in realization on the machine readable media The software program code of the function of any embodiment in embodiment is stated, and the computer of the system or device or processor is made to read Go out and executes the machine instruction being stored in the machine readable media.

In this case, it can be achieved any one in above-described embodiment from the program code itself that machine readable media is read The function of item embodiment, therefore the machine readable media of machine readable code and storage machine readable code constitutes the present invention's A part.

The embodiment of machine readable media include floppy disk, hard disk, magneto-optic disk, CD (such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW), tape, non-volatile memory card and ROM.It selectively, can be by communication network Network download program code from server computer or on cloud.

It should be noted that step and module not all in above-mentioned each flow and each system construction drawing is all necessary , certain steps or module can be ignored according to the actual needs.Each step execution sequence be not it is fixed, can be according to need It is adjusted.System structure described in the various embodiments described above can be physical arrangement, can also be logical construction, that is, have A little modules may be realized by same physical entity, be realized by multiple physical entities alternatively, some modules may divide, alternatively, can be with It is realized jointly by certain components in multiple autonomous devices.

In the above various embodiments, hardware cell mechanically or can be realized electrically.For example, a hardware list Member may include permanent dedicated circuit or logic (such as special processor, FPGA or ASIC) to complete corresponding operating.Firmly Part unit can also include programmable logic or circuit (such as general processor or other programmable processors), can by software into The interim setting of row is to complete corresponding operating.Concrete implementation mode (mechanical system or dedicated permanent circuit or is faced When the circuit that is arranged) can be determined based on cost and temporal consideration.

Detailed displaying and explanation carried out to the present invention above by attached drawing and preferred embodiment, however the present invention is not limited to These embodiments having revealed that, base could be aware that with above-mentioned multiple embodiment those skilled in the art, can combine above-mentioned difference Code audit means in embodiment obtain the more embodiments of the present invention, these embodiments also protection scope of the present invention it It is interior.

Claims (20)

1. the Item Information transmission method in Internet of Things, which is characterized in that including:
Article mark of one the first equipment (201) from the article (210) received at second equipment (202) in Internet of Things Know information (230), wherein the article identification information (230) is documented in a label for identifying the article (210) (220) in, second equipment (202) is used to obtain the article identification information (230) from the label (220);
First equipment (201) determines verification information (240), wherein
The verification information (240) describes the device attribute of second equipment (202), and does not include second equipment (202) equipment identification information, and/or
The verification information (240) describes the attribute of the user of second equipment (202), and does not include the user Identification information;
First equipment (201) sends an Item Information request message to a third equipment (203), wherein
The Item Information request message includes the verification information (240) and the article identification information (230), and
The third equipment (203), for determining that the Item Information request message has according to the verification information (240) When the permission of the Item Information (250) obtained, the Item Information (250) is provided;
First equipment (201) receives the Item Information (250) from the third equipment (203);
The Item Information (250) of reception is sent to second equipment (202) by first equipment (201).
2. the method as described in claim 1, which is characterized in that
After first equipment (201) receives the article identification information (230), determine the verification information (240) it Before, the method further includes:First equipment (201) judges institute according to the equipment identification information of second equipment (202) The whether legal of the second equipment (202) is stated, first equipment (201) determines the verification information (240), including:If described First equipment (201) determines that second equipment (202) is legal, it is determined that the verification information (240);And/or
After first equipment (201) receives the article identification information (230), determine the verification information (240) it Before, the method further includes:First equipment (201) is believed according to the identity of the user of second equipment (202) Breath judges whether the user of second equipment (202) is legal, and first equipment (201) determines the verification information (240), including:If first equipment (201) determines that the user of second equipment (202) is legal, it is determined that described to test Demonstrate,prove information (240).
3. method as claimed in claim 1 or 2, which is characterized in that second equipment (202) obtains the Item Information (250) with the article (210) of merchandising, the Item Information (250) of reception is sent to institute in first equipment (201) After stating the second equipment (202), the method further includes:
First equipment (201) records the Transaction Information of the article (210);
First equipment (201) sends the Transaction Information to second equipment (202).
4. method as claimed in claim 3, which is characterized in that the article identification information (230) is for described in unique mark Article (210), the method further include:
First equipment (201) notifies the third equipment (203) to delete after determining that the article (210) is merchandised successfully The Item Information (250).
5. such as Claims 1 to 4 any one of them method, which is characterized in that
First equipment (201) is credible for second equipment (202) and the third equipment (203).
6. method as claimed in claim 5, which is characterized in that
First equipment (201) is the equipment that a mobile operator is provided, and second equipment (202) is the mobile fortune Seek the mobile terminal that quotient provides service.
7. the Item Information transmission method in Internet of Things, which is characterized in that including:
One third equipment (203) receives an Item Information request message, the article letter at first equipment (201) It includes verification information (240) and article identification information (230) to cease request message, wherein
The article identification information (230) is documented in a label (220) for identifying an article (210) in Internet of Things In;
The verification information (240) describes the device attribute of second equipment (202), and does not include second equipment (202) equipment identification information and/or the verification information (240) describes the category of the user of second equipment (202) Property, and do not include the identification information of the user;
The third equipment (203) judges whether the Item Information request message has and obtains according to the verification information (240) The permission of the Item Information (250) taken;
If the Item Information request message has the permission for obtaining the Item Information (250), to first equipment (201) Item Information (250) is sent.
8. the method for claim 7, which is characterized in that the article identification information (230) is for described in unique mark Article (210), and the Item Information (250) is acquired with the article (210) of merchandising, the method further includes:
The third equipment (203) is deleted after the notice for receiving the first equipment (201) deletion Item Information (250) Except the Item Information (250).
9. the Item Information Transmission system (20) in Internet of Things, which is characterized in that including:
One the second equipment (202), for being used to identify from Internet of Things described in label (220) acquisition of an article (210) The article identification information (230) of article (210), and send the article identification information (230) to first equipment (201);
First equipment (201), is used for
Determine verification information (240), wherein the verification information (240) describes the equipment category of second equipment (202) Property, and do not include that the equipment identification information of second equipment (202) and/or the verification information (240) describe described the The attribute of the user of two equipment (202), and do not include the identification information of the user, and
An Item Information request message is sent to a third equipment (203), wherein is wrapped in the Item Information request message Include the verification information (240) and the article identification information (230);
The third equipment (203), for according to the verification information (240), whether judging the Item Information request message The permission of the Item Information (250) with acquisition;And if the Item Information request message has the acquisition article The permission of information (250) then sends the Item Information (250) to first equipment (201);
First equipment (201) is additionally operable to receive the Item Information (250) from the third equipment (203), and will The Item Information (250) received is sent to second equipment (202);
Second equipment (202) is additionally operable to receive the Item Information (250).
10. the first equipment (201), for realizing the Item Information transmission in Internet of Things, which is characterized in that including:
One the first transceiver module (2011) is used for from the article received at second equipment (202) in Internet of Things (210) article identification information (230), wherein the article identification information (230) is documented in for identifying the article (210) in a label (220), second equipment (202) is used to obtain the article mark letter from the label (220) It ceases (230);
One processing module (2012), for determining verification information (240), wherein
The verification information (240) describes the device attribute of second equipment (202), and does not include second equipment (202) equipment identification information, and/or
The verification information (240) describes the attribute of the user of second equipment (202), and does not include the user Identification information;
One the second transceiver module (2013), for sending an Item Information request message to a third equipment (203), In,
The Item Information request message includes the verification information (240) and the article identification information (230), and
The third equipment (203), for determining that the Item Information request message has according to the verification information (240) When the permission of the Item Information (250) obtained, the Item Information (250) is provided;
Second transceiver module (2013) is additionally operable to receive the Item Information from the third equipment (203) (250);
First transceiver module (2011) is additionally operable to the Item Information for receiving second transceiver module (2013) (250) it is sent to second equipment (202).
11. equipment as claimed in claim 10, which is characterized in that
The processing module (2012), is additionally operable to:The article identification information is received in first transceiver module (2011) (230) after, before the processing module (2012) determines the verification information (240), according to second equipment (202) Equipment identification information judges the whether legal of second equipment (202);The processing module (2012) is determining the verification It is specifically used for when information (240):If second equipment (202) is legal, it is determined that the verification information (240);And/or
The processing module (2012), is additionally operable to:The article identification information is received in first transceiver module (2011) (230) after, before the processing module (2012) determines the verification information (240), according to second equipment (202) The identification information of user judges whether the user of second equipment (202) is legal, the processing module (2012) It is specifically used for when determining the verification information (240):If the user of second equipment (202) is legal, it is determined that described Verification information (240).
12. the equipment as described in claim 10 or 11, which is characterized in that second equipment (202) obtains the article letter Cease (250) with the article (210) of merchandising,
The processing module (2012) is additionally operable to:In first transceiver module (2011) by second transceiver module (2013) The Item Information (250) received is sent to after second equipment (202), records the transaction letter of the article (210) Breath;
First transceiver module (2011), is additionally operable to:The Transaction Information is sent to second equipment (202).
13. equipment as claimed in claim 12, which is characterized in that the article identification information (230) is used for unique mark institute Article (210) is stated, the processing module (2012) is additionally operable to:
After determining that the article (210) is merchandised successfully, the third equipment is notified by second transceiver module (2013) (203) Item Information (250) is deleted.
14. such as claim 10~13 any one of them equipment, which is characterized in that
First equipment (201) is credible for second equipment (202) and the third equipment (203).
15. equipment as claimed in claim 14, which is characterized in that
First equipment (201) is the equipment that a mobile operator is provided, and second equipment (202) is the mobile fortune Seek the mobile terminal that quotient provides service.
16. third equipment (203), for realizing the Item Information transmission in Internet of Things, which is characterized in that including:
One transceiver module (2031) is described for receiving an Item Information request message at first equipment (201) Item Information request message includes verification information (240) and article identification information (230), wherein
The article identification information (230) is documented in a label (220) for identifying an article (210) in Internet of Things In;
The verification information (240) describes the device attribute of second equipment (202), and does not include second equipment (202) equipment identification information and/or the verification information (240) describes the category of the user of second equipment (202) Property, and do not include the identification information of the user;
One processing module (2032), for according to the verification information (240), whether judging the Item Information request message The permission of the Item Information (250) with acquisition;
The transceiver module (2031) obtains the Item Information (250) if being additionally operable to the Item Information request message and having Permission, then send the Item Information (250) to first equipment (201).
17. equipment as claimed in claim 16, which is characterized in that the article identification information (230) is used for unique mark institute Article (210) is stated, and the Item Information (250) is acquired with the article (210) of merchandising, the processing module (2032) is also For:
The notice that first equipment (201) deletes the Item Information (250) is being received by the transceiver module (2031) Afterwards, the Item Information (250) is deleted.
18. the first equipment (201), which is characterized in that including:
One first transceiver (2014) is used for from the article (210) received at second equipment (202) in Internet of Things Article identification information (230), wherein the article identification information (230) is documented in one for identifying the article (210) In a label (220), second equipment (202) is used to obtain the article identification information (230) from the label (220);
One processor (2015), for determining verification information (240), wherein
The verification information (240) describes the device attribute of second equipment (202), and does not include second equipment (202) equipment identification information, and/or
The verification information (240) describes the attribute of the user of second equipment (202), and does not include the user Identification information;
One second transceiver (2016), for sending an Item Information request message to a third equipment (203), In,
The Item Information request message includes the verification information (240) and the article identification information (230), and
The third equipment (203), for determining that the Item Information request message has according to the verification information (240) When the permission of the Item Information (250) obtained, the Item Information (250) is provided;
The second transceiver (2016) is additionally operable to receive the Item Information (250) from the third equipment (203);
The first transceiver (2014) is additionally operable to the Item Information (250) for receiving the second transceiver (2016) It is sent to second equipment (202).
19. third equipment (203), for realizing the Item Information transmission in Internet of Things, which is characterized in that including:
One transceiver (2033), for receiving an Item Information request message, the object at first equipment (201) Product information request message includes verification information (240) and article identification information (230), wherein
The article identification information (230) is documented in a label (220) for identifying an article (210) in Internet of Things In;
The verification information (240) describes the device attribute of second equipment (202), and does not include second equipment (202) equipment identification information and/or the verification information (240) describes the category of the user of second equipment (202) Property, and do not include the identification information of the user;
One processor (2034), for according to the verification information (240), judging whether the Item Information request message has There is the permission of the Item Information (250) of acquisition;
The transceiver (2033) obtains the Item Information (250) if being additionally operable to the Item Information request message and having Permission then sends the Item Information (250) to first equipment (201).
20. a kind of machine readable media, which is characterized in that be stored with machine instruction, the machine on the machine readable media Instruction makes the processor perform claim require the method described in any one of 1-8 when being executed by processor.
CN201710062986.9A 2017-01-24 2017-01-24 Item Information transmission method, device and system in a kind of Internet of Things CN108347469A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710062986.9A CN108347469A (en) 2017-01-24 2017-01-24 Item Information transmission method, device and system in a kind of Internet of Things

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201710062986.9A CN108347469A (en) 2017-01-24 2017-01-24 Item Information transmission method, device and system in a kind of Internet of Things
US15/867,796 US20180211057A1 (en) 2017-01-24 2018-01-11 Transmission method, apparatus and system
US15/867,889 US10755238B2 (en) 2017-01-24 2018-01-11 Transmission method, apparatus and system
EP18153242.5A EP3352120A1 (en) 2017-01-24 2018-01-24 Thing information transmission method, apparatus and system in internet of things

Publications (1)

Publication Number Publication Date
CN108347469A true CN108347469A (en) 2018-07-31

Family

ID=61198659

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710062986.9A CN108347469A (en) 2017-01-24 2017-01-24 Item Information transmission method, device and system in a kind of Internet of Things

Country Status (3)

Country Link
US (2) US10755238B2 (en)
EP (1) EP3352120A1 (en)
CN (1) CN108347469A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2378451A1 (en) * 2010-04-19 2011-10-19 Vodafone Holding GmbH User authentication in a tag-based service
CN104463593A (en) * 2013-09-18 2015-03-25 曲立东 Label data application method and device
CN105095978A (en) * 2015-09-30 2015-11-25 张华� Ordering method and device based on two-dimension code and door control system
CN105187357A (en) * 2014-06-04 2015-12-23 北京大学深圳研究生院 Two-dimension code verification method and system
CN105912968A (en) * 2016-04-19 2016-08-31 成都东哲科技有限公司 Commodity information recognition method and system based on radio frequency

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8533055B1 (en) * 2011-06-29 2013-09-10 Amazon Technologies, Inc. Trade-in photo documentation
CN102752444A (en) 2012-05-24 2012-10-24 成都集客宝信息技术有限公司 Two-dimensional code application method, mobile terminal and system
FR2993382B1 (en) * 2012-07-13 2015-07-03 Oberthur Technologies Secure electronic entity for the authorization of a transaction
CN102930451A (en) 2012-09-19 2013-02-13 腾讯科技(深圳)有限公司 Information managing method, two-dimension code generating method and relative devices
CN103825734B (en) 2012-11-16 2016-11-09 深圳市腾讯计算机系统有限公司 Sensitive operation verification method, terminal device, server and checking system
CN103258182A (en) 2013-05-24 2013-08-21 深圳市检验检疫科学研究院 Conversion method and system for article bar code and electronic tag
CN103532971B (en) 2013-10-24 2017-01-25 北京星网锐捷网络技术有限公司 Authentication method, device and system based on two-dimensional code
CN103593750A (en) 2013-11-29 2014-02-19 中国建筑第八工程局有限公司 Radiofrequency identification (RFID) based supply chain management (SCM) tracking system
CN105099688B (en) 2014-05-15 2018-12-21 阿里巴巴集团控股有限公司 A kind of operating method of electronic account, the methods of exhibiting and device for paying the page
US20190287141A1 (en) * 2015-05-12 2019-09-19 A La Carte Media Inc. Systems and methods for remote collection of electronic devices for value
CN105448006A (en) 2015-12-30 2016-03-30 武汉邮电科学研究院 Intelligent supermarket cashier system and method based on mobile payment and IOT (Internet of Things)

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2378451A1 (en) * 2010-04-19 2011-10-19 Vodafone Holding GmbH User authentication in a tag-based service
CN104463593A (en) * 2013-09-18 2015-03-25 曲立东 Label data application method and device
CN105187357A (en) * 2014-06-04 2015-12-23 北京大学深圳研究生院 Two-dimension code verification method and system
CN105095978A (en) * 2015-09-30 2015-11-25 张华� Ordering method and device based on two-dimension code and door control system
CN105912968A (en) * 2016-04-19 2016-08-31 成都东哲科技有限公司 Commodity information recognition method and system based on radio frequency

Also Published As

Publication number Publication date
US20180211063A1 (en) 2018-07-26
US20180211057A1 (en) 2018-07-26
EP3352120A1 (en) 2018-07-25
US10755238B2 (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US10387695B2 (en) Authenticating and managing item ownership and authenticity
US10530769B2 (en) Handling encoded information
JP5719871B2 (en) Method and apparatus for preventing phishing attacks
US20150288521A1 (en) Hardware-based zero-knowledge strong authentication (h0ksa)
US9521548B2 (en) Secure registration of a mobile device for use with a session
US20140351123A1 (en) Using Low-Cost Tags to Facilitate Mobile Transactions
CN102881071B (en) electronic ticket anti-fake system and method
CN103139778B (en) wireless local area network access system and method
US20150327067A1 (en) Authentication mechanisms for wireless networks
US20150324789A1 (en) Cryptocurrency Virtual Wallet System and Method
RU2537795C2 (en) Trusted remote attestation agent (traa)
CN102271042B (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
US9038196B2 (en) Method for authenticating a user requesting a transaction with a service provider
US9792598B2 (en) System and method for initially establishing and periodically confirming trust in a software application
US20160314462A1 (en) System and method for authentication using quick response code
CA3017858A1 (en) Certificate issuing system based on block chain
KR101993239B1 (en) Method and apparatus for managing user device and contents using QR code
TWI539838B (en) Method and apparatus for access credential provisioning
CN101442525B (en) System and method of performing electronic transactions
KR100695566B1 (en) System and method of secure authentication and billing for goods and services using a celluler telecommunication and an authorization infrastructure
US20170180337A1 (en) Techniques to verify location for location based services
US8175979B2 (en) Method and system for anonymous electronic transactions using a mobile device
US8650614B2 (en) Interactive phishing detection (IPD)
US20160027021A1 (en) Product Authenticator
US10360561B2 (en) System and method for secured communications between a mobile device and a server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination